Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ;Assumes (IX-2) and (IX-1) are 1 byte X and Y coordinates to modify
- ;Uses ti.GetCSC scan codes.
- ;Assumes that the keycode is 1,2,3, or 4, otherwise unexpected results.
- ;Destroys A,HL
- lea hl,ix-1
- sub a,2
- bit 1,a
- jr nz,$+1
- inc hl
- bit 0,a
- jr z,$+3
- inc (hl)
- jr $+1
- dec (hl)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement